Hacker News new | past | comments | ask | show | jobs | submit login

Still reading the handbook but this reminds me of Talos Linux[0] - which is also a pure golang k8s focused linux distro.

[0] https://www.talos.dev/




Thank you for sending this, Talos looks cool! I would not recommend actually running it in production though -- it does not seem possible to set up in a secure way. (unless you have an out-of-band VPN to the machine?)

See this: https://www.talos.dev/v1.6/introduction/getting-started/#mod...

The first time you send the machine config, you have to use the --insecure flag to avoid verifying its TLS cert. More concerning, there seems to be no way for you to authenticate yourself to the new machine. Anyone (most likely an automated scanner) could come in and make it theirs at this point.

Is there a solution for that?


Sure, there are solutions presented in the installation guide [1]. It usually involves using the cloud or virtualization platform's out of band channel, which Talos all supports, to securely provision a config on first boot.

You can also generate a custom installation medium or cloud image that pulls config from your trusted machines if you cannot use out-of-band provisioning.

You can also securely use the insecure maintenance mode when there is a firewall in front of the machine, which prevents access by non-administrator clients to the API ports on IP level.

I'm not a fan of Talos booting into insecure maintenance mode without config w/o prompting for at least a PIN displayed on-screen, but the problem you're describing in no way prevents production use.

[1] https://www.talos.dev/v1.6/talos-guides/install/


You can build a custom iso with a "talos.config" kernel parameter set which instructs Talos to download and apply a configuration on boot.


How can you bootstrap a PKI without having a trusted out of band channel?


You can’t, but other commenters pointed out that the OOB is specialized to each cloud and in another part of the guide.


We run Talos in production at Turnkey, including using it to schedule Nitro Enclaves so our most critical workloads can survive even if the whole cluster is compromised.

As others have mentioned, you do need a bit of DIY boootstrapping for PKI. Hopefully we can make our setup portable enough to open source soon.


Talos appears to rely on existing components to a somewhat greater degree in comparison: https://github.com/siderolabs/pkgs


I had the some thought pop up. I am curious if someone more familiar can do any comparison between the two.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: